browser.exe

Speed Browser

Long Mile Solutions, LLC

The application browser.exe has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address bam-6.nr-data.net on port 443.
Publisher:
Long Mile Solutions, LLC

Product:
Speed Browser

Version:
37.0.2062.94

MD5:
b11efd9cb14b6cc63a72b9bcb4802d01

SHA-1:
f31273049363ab26b7d3ef4f14ddb1073c3a54f7

SHA-256:
dad74ff11b9b55efeec24e1823ea52c9ae6ea96f18a8ba440346f4253f4221d0

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
4/27/2024 3:39:27 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Injekt.LongMileSolutions.Meta (M)
15.6.19.11

File size:
788.5 KB (807,424 bytes)

Product version:
37.0.2062.94

Copyright:
Copyright 2014 Long Mile Solutions, LLC. All rights reserved.

Original file name:
browser.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\speed browser\application\browser.exe

File PE Metadata
Compilation timestamp:
9/19/2014 12:16:59 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:IZMbWRTzW/HiYVeVa8HvgXJpX4ZHJG1m7JKfna6jN6ZgYCcurjRWfJ6UEwDogt/L:IZ9R68HlpG1MsPaBZIjRBDe

Entry address:
0x44988

Entry point:
E8, 57, D1, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 8B, 45, 08, 99, F7, 7D, 0C, 5D, C3, CC, CC, 8B, 44, 24, 08, 8B, 4C, 24, 10, 0B, C8, 8B, 4C, 24, 0C, 75, 09, 8B, 44, 24, 04, F7, E1, C2, 10, 00, 53, F7, E1, 8B, D8, 8B, 44, 24, 08, F7, 64, 24, 14, 03, D8, 8B, 44, 24, 08, F7, E1, 03, D3, 5B, C2, 10, 00, A1, 64, 6A, 49, 00, 56, 6A, 14, 5E, 85, C0, 75, 07, B8, 00, 02, 00, 00, EB, 06, 3B, C6, 7D, 07, 8B, C6, A3, 64, 6A, 49, 00, 6A, 04, 50, E8, 30, 52, 00, 00, A3, 60, 6A, 49, 00, 59, 59, 85, C0, 75, 1E, 6A, 04...
 
[+]

Entropy:
6.4072

Code size:
387 KB (396,288 bytes)

Windows Firewall Allowed Program
Name:
C:\Program Files\speed browser\Application\browser.exe


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-171-43-206.eu-west-1.compute.amazonaws.com  (54.171.43.206:80)

TCP (HTTP SSL):
Connects to a104-101-255-70.deploy.static.akamaitechnologies.com  (104.101.255.70:443)

TCP (HTTP):
Connects to ec2-54-72-47-163.eu-west-1.compute.amazonaws.com  (54.72.47.163:80)

TCP (HTTP):
Connects to ec2-52-214-166-46.eu-west-1.compute.amazonaws.com  (52.214.166.46:80)

TCP (HTTP):
Connects to ec2-54-246-181-97.eu-west-1.compute.amazonaws.com  (54.246.181.97:80)

TCP (HTTP):
Connects to ec2-52-17-158-153.eu-west-1.compute.amazonaws.com  (52.17.158.153:80)

TCP (HTTP SSL):
Connects to 205.245.178.107.bc.googleusercontent.com  (107.178.245.205:443)

TCP (HTTP):
Connects to redirector1.dynect.net  (216.146.46.10:80)

TCP (HTTP SSL):
Connects to bam-6.nr-data.net  (162.247.242.18:443)

TCP (HTTP):

TCP (HTTP):
Connects to a104-93-193-238.deploy.static.akamaitechnologies.com  (104.93.193.238:80)

TCP (HTTP SSL):
Connects to server-52-84-7-146.ord54.r.cloudfront.net  (52.84.7.146:443)

TCP (HTTP SSL):
Connects to server-52-84-63-183.ord51.r.cloudfront.net  (52.84.63.183:443)

TCP (HTTP SSL):
Connects to ec2-107-23-2-254.compute-1.amazonaws.com  (107.23.2.254:443)

TCP (HTTP):
Connects to a104-85-250-40.deploy.static.akamaitechnologies.com  (104.85.250.40:80)

TCP (HTTP):
Connects to 178.5.211.130.bc.googleusercontent.com  (130.211.5.178:80)

TCP (HTTP SSL):
Connects to server-54-230-95-120.fra2.r.cloudfront.net  (54.230.95.120:443)

TCP (HTTP SSL):
Connects to server-54-230-5-178.dfw3.r.cloudfront.net  (54.230.5.178:443)

TCP (HTTP):
Connects to server-54-230-5-116.dfw3.r.cloudfront.net  (54.230.5.116:80)

TCP (HTTP):
Connects to server-52-85-184-93.fra2.r.cloudfront.net  (52.85.184.93:80)

Remove browser.exe - Powered by Reason Core Security